Find An Analyst

Browse

Name Coverage Area
Kandaswamy,Rajesh Banking & Investment Services
Karamouzis,Frances Outsourcing & IT Services
Kart,Lisa Banking & Investment Services
Business Intelligence
Katayama,Harutoshi Application Development & Integration
Katayama,Hiroyuki Customer Relationship Management
Government
IT Management
Katz,Wally Servers & Storage
Kaur,Rajpreet Security & Privacy
Kavanagh,Kelly M. Security & Privacy
Kawabe,Kensuke Customer Relationship Management
Keene,Ian Networking & Communications Equipment
Kenefick,Sean Open Source
Application Development & Integration
Kerremans,Marc Business Process Management
Kihn,Martin Digital Marketing
Kim,Andrew Servers & Storage
Kim,Elizabeth Print Markets & Management
Kish,Deborah Networking & Communications Equipment
Kitagawa,Mikako PCs, Laptops & Handheld Devices
Kjeldsen,Peter Networking & Communications Equipment
Klappich,C. Dwight Supply Chain
Kleynhans,Stephen PCs, Laptops & Handheld Devices
Consumer Technologies
Knipp,Eric Web Services
Knoernschild,Kirk Application Development & Integration
Web Services
Knox,Kevin PCs, Laptops & Handheld Devices
IT Operations
Knox,Mary Banking & Investment Services
Koehler-Kruener,Hanns High Performance Workplace
Kohler,David Customer Relationship Management
Kohler,Jan Supply Chain
Koslowski,Thilo Manufacturing
Kost,John IT Management
Government
Kota,Heeral Servers & Storage
Kowall,Jonah IT Operations
Kraus,Drew Networking & Communications Equipment
Kreizman,Gregg Security & Privacy
Krikken,Ramon Security & Privacy
Kros,Anthony PCs, Laptops & Handheld Devices
Kumar,Neha Servers & Storage
Kumar,Rakesh Servers & Storage
Kuniba,Masao Semiconductors
Kurth,Martina Networking & Communications Services
Kyte,Andy Enterprise Business Applications & ERP
Gartner, Inc.

Become a Client

Call us now at:

+1-800-213-4848 Or
Contact us Online

RESEARCH

MORE

WEBINARS

MORE
  • 28 Oct 2014

    What Your Network Security Will Look Like in 2018 We take you ahead in time to what your network security will and won't be like in the not-so-distant future of 2018 and points between then and now. With many network security safeguards having five-year life spans, the decisions you are making now are already affecting 2018.
  • 28 Oct 2014

    Top Recommendations to Design an Effective Governance Process Successfully implementing governance requires both leadership and execution. Great IT leaders are masters of process. They understand that executing governance programs requires process, discipline and creativity. Governance processes are not "one size fits all." This session focuses on designing a governance process to suit the specific needs of your enterprise.